Information Security Leader, Author, Instructor and Speaker

Default utility Image

IDC PlanScape: Threat Intelligence Solutions TAGS: “Threat intelligence is a foundational component of a modern cybersecurity program,” says Mike Chapple, adjunct analyst with IDC’s IT Executive …Continue reading →

Default utility Image

The CIO’s Playbook: Preparing for Data Breach Notifications TAGS: | | “The days and hours immediately after a data breach are critical,” said Mike Chapple, adjunct research analyst with IDC’s IT …Continue reading →

Default utility Image

5 Tips for Updating a Cybersecurity Incident Response Plan TAGS: | Many security teams are operating with incident response plans that haven’t been updated — or even looked at — in …Continue reading →

Default utility Image

IDC’s Worldwide Digital Transformation Use Case Taxonomy, 2019: Higher Education “To continue to be relevant to society and to students, all institutions face the need to transform their academic capabilities …Continue reading →

Default utility Image

Cloud Access Security Brokers Give IT Staff Visibility and Oversight TAGS: Colleges and universities are rapidly expanding their use of cloud services, ranging from complete infrastructure deployments to specialized applications. This leaves cybersecurity …Continue reading →

Default utility Image

Security Automation: Eight Things You Can Do Now for Security at Scale TAGS: “Automation plays an increasingly important role in cybersecurity programs,” said Mike Chapple, adjunct research analyst at IDC’s IT Executive Programs. “Automation serves …Continue reading →

Default utility Image

IDC PlanScape: Launching a Bug Bounty Program TAGS: “Bug bounty programs incentivize security researchers to test your systems for weaknesses and then provide you with an opportunity to fix the …Continue reading →

Default utility Image

5 Steps to Integrate a Business’ Security Solutions TAGS: Your organization probably has a diverse set of security tools working to help reduce your risk profile and combat active …Continue reading →

Default utility Image

4 Ways to Keep Sensitive Data from Escaping to the Public Cloud TAGS: | Think about how many cloud services you use every day. Chances are that it’s a mixture of services managed by your employer and others …Continue reading →

Default utility Image

How to Choose Between Penetration Tests and Vulnerability Scans  TAGS: | Even seasoned cybersecurity professionals confuse penetration tests with vulnerability scans. Both play an important role in the security practitioner’s toolkit, but …Continue reading →